www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242

advertisement
www.ijecs.in
International Journal Of Engineering And Computer Science ISSN:2319-7242
Volume2 Issue 8 August, 2013 Page No. 2641-2644
Trust Aware AODV
V.Vallinayagi1 Dr G.M, Nasira2
Dept of CS, SSC COLLEGE, T.N 627011,INDIA
Dept of CA, TIRUPUR, T.N 627012, INDIA
ABSTRACT:
The advantage of Mobile Ad-hoc Networks (MANETs) is to form a wireless network in the absence of fixed infrastructure. . In
defining and managing trust in a military MANET, we must consider the interactions between the composite cognitive,
social, information and communication networks, and take into account the severe resource constraints. We provide a survey of
trust management schemes developed for MANETs and discuss generally accepted classifications, potential attacks, performance
metrics, and trust metrics in MANETs. Finally, we discuss future research areas on trust management in MANETs based on the
concept of social. AODV node is able to discover multiple loop-free paths as candidates in one route discovery. These are
evaluated by two values hop count and trust values. In this paper we discuss about trust value and improves the packet ratio
Keyword: Manet,aodv trustvalue,path,time
INTRODUCTION:
In traditional wireless networks, a base station or access point
facilitate communications between nodes with the Network and
Communications with destinations outside he network. In
contrast, MANETs forms a network in the absence of fixed
infrastructures. The requirement of these networks is only
nodes that can interact with radio hard wares so as to route the
traffic using the routing protocol. Thus the reduced essential
requirement s of such networks, along with their adoptability
into tiny resource-limited devices made them more popular
and is much preferred for several applications in the area of
communications.
Routing protocols determines the nature of data forwardness
as well as
its adaptability
to
topology changes that results by mobility. Initial MANET
routing protocol like AODV [1]was not designed to withstand
malicious nodes within the network or outside attackers near
by with malicious intent. Subsequent protocols and protocol
extensions have been proposed to address the issue of security
Many of these protocols seek to apply cryptographic methods
to the existing protocols in order to secure the information in
the routing packets. This attack is very effective in MANETs,
as the devices often have limited battery power in addition to
the limited computational power.
There are two primary motivations associated with trust
management in MANETs. Firstly, trust evaluation helps
identify malicious entities. One entity can remember others
behaviors through evaluation
history. This memory provides a method for good entities to
avoid working with „ex-Convict‟ or suspected ones. Secondly,
trust management offers a prediction of one‟s future behaviors
and improves network performance. The results of evaluation
can be directly applies as an incentive for a good or honest
behavior while a penalty for a selfish or malicious behavior in
the network. The feedback reminds network participants to act
with caution.
In table II the time, storage and communication complexity
are given for different and hoc routing protocols. Time
complexity is defined as the number of steps needed to
perform a protocal operations, Storage Complexity measures
the order of the table size used by the protocols and
Communication Complexity gives the number of messages
needed to perform an operation when
an update occurs.
On Demand
Table Driven
Availability of
routing
information
Available when
needed
Periodic route
updates
Copying with
mobility
Not required
Always
available
regardless of
need
Required.
Parameters
Signaling traffic
generator
V.Vallinayagi1 IJECS Volume 2 Issue 8 August, 2013 Page No.2641-2644
Use localized
route discovery
as an ABR and
SSR.
Grows with
increasing
mobility of
Inform other
nodes to
achieve a
consistent
routing table.
Greater than
that of on –
demand routing
Page 2641
active routes.
Communica
tion
Complexity
Proto
cal
Time
Storag
Comple e
xity
Compl
exity
DSDV
O(d)
O(X)
CGSR
O(d)
O(N/M
)
WRP
O(h)
O(X*A
)
AOD
V
DSR
O(2d)
O(E)
O(2d)
O(E)
O(2N)
TORA
O(2d)
O(Dd*
A)
O(2A)
O(N)
O(N)
O(N)
O(2N)
Where,
N=Number of nodes in the network
d=Network diameter
E=Communication pairs
M=Average number of nodes in a cluster
X=Number of nodes affected by topological
Change
H=Height of routing tree
A=Average number of adjacent nodes
Dd=Number of maximum desired
Destination
2. NODE’S TRUST VALUE CALCULATION
Measuring the trust value of the node is always a
challenging problem [14&15].A nodes trustworthiness is
often related to the quality of services it provides to
others. If the quality of the service can be objectively
measured, then entities trustworthiness for that service is
called objective trust.
Most of the previous research used the approach
of subjective trust. Then they classified the trust relation
as direct and indirect relation. The direct trust relation of
a node is related to its neighbors while the indirect trust
relation is concerned with the non-neighbors.
RFN (M)(Request-for-Forwarding);The total no of
packets that node N has transmitted to node M for
Forwarding.
HFN (M) (Has-Forwarded):The total no of packets
that have been forwarded by node M and is noticed by
node N.
The two no are updated by the following rules. When
node N sends a packet to node M for forwarding, the
counter RFN (M) is increased by one. Then node N
listens to the wireless channel and check whether node
M forwards the packet as expected. If node N detects
that node M has forwarded the packet before a preset
time –out expires , the counter HFN (M) is increased by
one.
Trust value calculation basic scheme
drawbacks :(1) Increased nodes power consumption
because it assumes that each node operates in
promiscuous mode to monitor its neighbors continually.
(2)Flooding the network by broadcasting the updated
evaluations consumes the network limited band with. (3)
The broadcasted evaluation records come from
misbehaving nodes which leads to wrong results. (4)
Taking into consideration the credibility of node i which
broadcasts its evaluation record about node X when
calculating OER(X) leads to computational overhead. (5)
It does not take into account a node‟s “selective
forwarding” behavior, where it only forwards small
packets while selectively discarding larger ones.
Route’s Evaluation
Each sending node S builds its own trust
evaluation table Teval(S) using the propagated trust
values in the network. T Eval(S) contains the trust value
of all other in the network. Using these trust information,
the sending node routing agent ROA(S) is responsible
for computing the most trustworthy route to a particular
destination. If the most trustworthy route trusts value is
found lower than a threshold value (denoted by R
threshold). The route is rejected and a new Route
Discovery process is initiated. The trust value in route R
by source node S is represented as Ts(R) and given by
the following equation:
Ts(R) =min(Trustvalue(Ni))  Ni ε R (4)
3. COMPUTATION OF NODE TRUST:
The trust of a node j in another node k (node trust
for short) is a measure to ensure that packets sent by
node j have actually been forwarded by node k. Two
trust factors [CFR (t) and DFR (t)] are assigned weights
in order to determine the overall trust value of a node.
The direct trust in node k by node j is represented as Tjk
and is given by the following formula
Tjk (t)= w1 × CFR jk (t) + w2 × DFRjk (t) (2)
Where CFRjk (t) and DFRjk (t) represent control packet
forwarding ratio and data packet forwarding ratio
observed by node j for forwarding node k at time t,
respectively. The weights w1 and w2 (w1,w2 ≥ 0 and
V.Vallinayagi1 IJECS Volume 2 Issue 8 August, 2013 Page No.2641-2644
Page 2642
w1+ w2=1) are assigned to CFR and DFR, respectively.
Node k forwards the packet correctly. If so, the trust
value Tjk increases. Otherwise, Tjk decreases. In our trust
model, trust values are limited in a continuous range
from 0 to 1 (i.e. 0≤ Tjk ≤ 1). The trust value of 0
signifies complete distrust whereas the value of 1
implies absolute trust. If there is no interaction between
two nodes, the initial trust value is set to 0.75 which is
minimum trust. A threshold n termed as the blacklist
trust threshold is used to detect malicious node In other
words if the trust value is smaller than n it is regarded is
malicious nodes.
4. Proposed system:
In this paper consider trust model
Which lives on time line? Many protocols consider
certain nodes as normal and certain are malicious node
because existing node‟s
Behavior changed. so the trust will be recalculated. Each
node is given specific time in that time the node
behavior is tested
Soothe trust is calculated based on the control packets
and data packets transmission initially to find the routes
of the nodes. Trust value calculates the transmission of
data packets. So every windows calculate the number of
data packets and control packets>0
5. Experiment results:
We have conducted a comprehensive test using ns2
2.34 and all experiments are done on a pc personal
computer with pIV
The graph is shown for finding the performance activity.
When 1000*1000 grid lines, we disperse 100 nodes
Time
window
To
Max Trust obtained
T1
T2
T3
T4
T5
0.79
0.81
0.83
0.85
0.88
Table.1
Fig 2
0.75
In fig2 based on time window, the level of the trust is
incresed gradually by isolating the no of malicious nodes
from the network.
No of nodes
10
30
50
70
Malicious
nodes
4
3
10
8
Table2
Based on the number of nodes and the transmission from
one node to another node,the trust values can be deviated
in every transmission.
Conclusion
Thus this paper considering the evolution of trust
on demand adaptive trust windows model to increase the
delectability of no of malicious nodes
References:
[1] Son, B., Her, Y., Kim, J., “A Design and Implementation
of Forest-Fires Surveillance
System based on Wireless Sensor Networks for South
Korea Mountains”, IJCSNS
International Journal of Computer Science and Network
Security, vol.6 No.9B, 124–130,
September 2006.
[2] Mainwaring et al, “Wireless Sensor Networks for Habitat
Monitoring”, International Workshop on Wireless Sensor
Networks and Applications (ACM), Sep. 2002,
[3] Chintalapudi, K.; Fu, T.; Paek, J.; Kothari, N.; Rangwala,
S.; Caffrey, J.; Govindan, R.; Johnson, E.; Masri, S.,
"Monitoring civil structures with a wireless sensor network,"
Internet Computing,IEEE , vol.10, no.2, pp. 26-34, MarchApril 2006
[4] Ian F. Akyildiz, Tommaso Melodia, Kaushik R.
Chowdhury, “A survey on wireless multimedia sensor
networks”, The International Journal of Computer and
Telecommunications
Networking, Vol. 51 , Iss. 4, March 2007, pp. 921-960.
[5] V. C. Giruka, M. Singhal, J. Royalty, S. Varanasi,
“Security in wireless sensor networks”, Wirel.
Commun. Mob. Comput. 2008; 8:1–24.
[6] T.Kavitha, D.Sridharan, “Security Vulnerabilities In
Wireless Sensor Networks: A Survey”Journal of Information
Assurance and Security, Vol. 5 (2010) 031-044.
[7] Jaydip Sen, “A Survey on Wireless Sensor Network
Security”, International Journal of
Communication Networks and Information Security
(IJCNIS) Vol. 1, No. 2, August 2009.
[8] Chris Karlof, David Wagner, “Secure routing in WSNs:
attacks and ountermeasures”, Ad hoc networks Journal,
vol. 1, Issue 2-3, Sept. 2003, pp.293-315.
[9] G. Padmavathi, D. Shanmugapriya, “A Survey of
Attacks: Security Mechanisms and Challenges in Wireless
Sensor Networks”, (IJCSIS) International Journal of
Computer Science and
V.Vallinayagi1 IJECS Volume 2 Issue 8 August, 2013 Page No.2641-2644
Page 2643
Information Security, Vol. 4, No. 1 & 2, 2009.
[10] Asad Amir Pirzada, Chris McDonald, and Amitava
Datta “Performance Comparison of
Trust-Based
Reactive
Routing
Protocols”,
IEEE
Transactions on Mobile Computing, Vol. 5,
No. 6, June 2006.
[11] Y. Sun, Z. Han, K. J. RAY Liu, “Defense of Trust
Management Vulnerabilities in Distributed
Networks”, IEEE Communications Magazine, February
2008, pp: 112–119.
[12] Sencun Zhu, Sanjeev Setia, Sushil Jajodia. “LEAP:
Efficient Security Mechanisms
V.Vallinayagi1 IJECS Volume 2 Issue 8 August, 2013 Page No.2641-2644
Page 2644
Download